Client...........................................................................................................................................................................................................104
Authentication Process............................................................................................................................................................... 104
Port-Based Network Access Control.......................................................................................................................................... 105
MAC-Based Network Access Control ....................................................................................................................................... 106
Configure Authenticator............................................................................................................................................................. 107
PAE System Control .................................................................................................................................................................. 109
Port Capability ............................................................................................................................................................................................109
RADIUS Server ......................................................................................................................................................................... 112
IP-MAC Binding.............................................................................................................................................................................. 113
ACL Mode ................................................................................................................................................................................. 113
IP-MAC Binding Port ................................................................................................................................................................ 115
IP-MAC Binding Table.............................................................................................................................................................. 116
IP-MAC Binding Blocked.......................................................................................................................................................... 117
Limited IP Multicast Range Settings ............................................................................................................................................... 118
Layer 3 IP Networking..................................................................................................................................................................... 119
Static ARP Table........................................................................................................................................................................ 119
DHCP/BOOTP Relay................................................................................................................................................................. 120
DHCP / BOOTP Relay Global Settings ......................................................................................................................................................120
DHCP/BOOTP Relay Interface Settings.....................................................................................................................................................123
Management..................................................................................................................................................................................... 124
Security IP ....................................................................................................................................................................................... 124
User Accounts.................................................................................................................................................................................. 124
Admin and User Privileges .........................................................................................................................................................................125
Access Authentication Control ........................................................................................................................................................ 126
Policy & Parameters................................................................................................................................................................... 127
Authentication Server Hosts....................................................................................................................................................... 129
Login Method Lists .................................................................................................................................................................... 131
Enable Method Lists .................................................................................................................................................................. 132
Local Enable Password .............................................................................................................................................................. 133
Enable Admin ............................................................................................................................................................................ 134
Secure Socket Layer (SSL) .............................................................................................................................................................. 135
Download Certificate ................................................................................................................................................................. 135
Configuration ............................................................................................................................................................................. 136
Secure Shell (SSH) .......................................................................................................................................................................... 137
SSH Configuration ..................................................................................................................................................................... 137
SSH Algorithm........................................................................................................................................................................... 138